IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\08C2R61KXR6ZBOMCKYFPSUSQF0USNXJ.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\YWOWNOLHBZPH3EQJI2TZBTF4JYVOK5.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\08C2R61KXR6ZBOMCKYFPSUSQF0USNXJ.exe.log
CSV text
dropped
C:\Windows\Tasks\skotes.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\08C2R61KXR6ZBOMCKYFPSUSQF0USNXJ.exe
"C:\Users\user\AppData\Local\Temp\08C2R61KXR6ZBOMCKYFPSUSQF0USNXJ.exe"
malicious
C:\Users\user\AppData\Local\Temp\YWOWNOLHBZPH3EQJI2TZBTF4JYVOK5.exe
"C:\Users\user\AppData\Local\Temp\YWOWNOLHBZPH3EQJI2TZBTF4JYVOK5.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
"C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe"
malicious
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
C:\Users\user\AppData\Local\Temp\abc3bc1985\skotes.exe
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.96.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://necklacedmny.store/1OlA
unknown
http://crl.microsoft3
unknown
http://185.215.113.16/mine/random.exe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://crl.microsoft:
unknown
https://www.ecosia.org/newtab/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://necklacedmny.store/apivt9
unknown
https://necklacedmny.store/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://185.215.113.16:80/off/def.exeicrosoft
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
http://185.215.113.16/off/def.exe
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
http://185.215.113.16/off/def.exee
unknown
https://necklacedmny.store:443/api
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
185.215.113.43
unknown
Portugal
malicious
188.114.96.3
necklacedmny.store
European Union
malicious
185.215.113.16
unknown
Portugal

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications
DisableNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AUOptions
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
AutoInstallMinorUpdates
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
NoAutoRebootWithLoggedOnUsers
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
UseWUServer
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotConnectToWindowsUpdateInternetLocations
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features
TamperProtection

Memdumps

Base Address
Regiontype
Protect
Malicious
831000
unkown
page execute and read and write
malicious
5500000
direct allocation
page read and write
malicious
F21000
unkown
page execute and read and write
malicious
831000
unkown
page execute and read and write
malicious
4840000
direct allocation
page read and write
malicious
49C0000
direct allocation
page read and write
malicious
5670000
direct allocation
page execute and read and write
19D3000
heap
page read and write
3D7F000
stack
page read and write
529E000
trusted library allocation
page read and write
99C000
heap
page read and write
53B1000
trusted library allocation
page read and write
B91000
trusted library allocation
page read and write
6FA000
unkown
page execute and read and write
999000
heap
page read and write
4E00000
remote allocation
page read and write
19EE000
heap
page read and write
4A1F000
stack
page read and write
3390000
heap
page read and write
52BA000
trusted library allocation
page read and write
19DA000
heap
page read and write
451F000
stack
page read and write
39DF000
stack
page read and write
51CD000
trusted library allocation
page execute and read and write
CF6000
unkown
page execute and write copy
993000
heap
page read and write
5299000
trusted library allocation
page read and write
6CC000
unkown
page execute and read and write
13E4000
unkown
page execute and read and write
6D2F000
stack
page read and write
52CA000
trusted library allocation
page read and write
4300000
direct allocation
page read and write
199E000
heap
page read and write
4B10000
direct allocation
page execute and read and write
19C0000
heap
page read and write
5071000
heap
page read and write
352E000
stack
page read and write
424000
heap
page read and write
5091000
heap
page read and write
5318000
trusted library allocation
page read and write
99A000
heap
page read and write
529A000
trusted library allocation
page read and write
5091000
heap
page read and write
689000
unkown
page execute and write copy
456000
unkown
page execute and write copy
43EF000
stack
page read and write
53B1000
trusted library allocation
page read and write
49C0000
direct allocation
page execute and read and write
BFB000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
52CB000
trusted library allocation
page read and write
42BE000
stack
page read and write
4750000
trusted library allocation
page read and write
573F000
trusted library allocation
page read and write
4311000
heap
page read and write
5331000
trusted library allocation
page read and write
259F000
stack
page read and write
5071000
heap
page read and write
52EB000
trusted library allocation
page read and write
5060000
direct allocation
page read and write
52C2000
trusted library allocation
page read and write
2F80000
heap
page read and write
19E1000
heap
page read and write
5071000
heap
page read and write
820000
direct allocation
page read and write
BFA000
trusted library allocation
page read and write
1982000
heap
page read and write
5071000
heap
page read and write
BCB000
trusted library allocation
page read and write
AE5000
trusted library allocation
page read and write
52D6000
trusted library allocation
page read and write
5671000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
19FD000
heap
page read and write
424000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
5071000
heap
page read and write
5071000
heap
page read and write
8A5D000
stack
page read and write
2F1E000
stack
page read and write
405E000
stack
page read and write
AE5000
trusted library allocation
page read and write
52CD000
trusted library allocation
page read and write
316E000
stack
page read and write
140E000
stack
page read and write
33BE000
stack
page read and write
1774000
heap
page read and write
5701000
trusted library allocation
page read and write
424000
heap
page read and write
1774000
heap
page read and write
4300000
direct allocation
page read and write
6664000
trusted library allocation
page read and write
736000
unkown
page execute and read and write
71D000
unkown
page execute and write copy
5297000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
19D3000
heap
page read and write
AE2000
trusted library allocation
page read and write
52F5000
trusted library allocation
page read and write
52D6000
trusted library allocation
page read and write
43BF000
stack
page read and write
3EFE000
stack
page read and write
283F000
stack
page read and write
9E5000
heap
page read and write
5C0000
heap
page read and write
6E3000
unkown
page execute and write copy
7ADE000
stack
page read and write
52B7000
trusted library allocation
page read and write
B7A000
trusted library allocation
page read and write
5561000
direct allocation
page read and write
38BE000
stack
page read and write
5349000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
52BF000
trusted library allocation
page read and write
B8A000
trusted library allocation
page read and write
402F000
stack
page read and write
553E000
stack
page read and write
28E0000
heap
page read and write
B95000
trusted library allocation
page read and write
275E000
stack
page read and write
4311000
heap
page read and write
52FE000
trusted library allocation
page read and write
5071000
heap
page read and write
53BC000
trusted library allocation
page read and write
52E2000
trusted library allocation
page read and write
4300000
direct allocation
page read and write
7BF000
stack
page read and write
52D2000
trusted library allocation
page read and write
4F5E000
stack
page read and write
5480000
heap
page read and write
376F000
stack
page read and write
53A0000
trusted library allocation
page read and write
529A000
trusted library allocation
page read and write
6FB000
unkown
page execute and write copy
AE8000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
BB7000
trusted library allocation
page read and write
3A2E000
stack
page read and write
5071000
heap
page read and write
53B1000
trusted library allocation
page read and write
AEB000
trusted library allocation
page read and write
52C2000
trusted library allocation
page read and write
BFD000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
B72000
trusted library allocation
page read and write
2D3F000
stack
page read and write
C0D000
trusted library allocation
page read and write
5071000
heap
page read and write
FF9000
stack
page read and write
AE3000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
4920000
direct allocation
page execute and read and write
1A0C000
heap
page read and write
573A000
trusted library allocation
page read and write
52C2000
trusted library allocation
page read and write
53A9000
trusted library allocation
page read and write
29EF000
stack
page read and write
6F4000
unkown
page execute and read and write
5080000
direct allocation
page read and write
43DF000
stack
page read and write
38DE000
stack
page read and write
5071000
heap
page read and write
4B40000
direct allocation
page execute and read and write
5060000
heap
page read and write
19E1000
heap
page read and write
AEE000
trusted library allocation
page read and write
52CB000
trusted library allocation
page read and write
AE5000
trusted library allocation
page read and write
5091000
heap
page read and write
4311000
heap
page read and write
4300000
direct allocation
page read and write
312F000
stack
page read and write
5500000
direct allocation
page read and write
5071000
heap
page read and write
9FE000
heap
page read and write
1980000
heap
page read and write
5091000
heap
page read and write
5660000
direct allocation
page execute and read and write
3C6F000
stack
page read and write
830000
unkown
page read and write
52CD000
trusted library allocation
page read and write
573B000
trusted library allocation
page read and write
B81000
trusted library allocation
page read and write
5071000
heap
page read and write
B8E000
trusted library allocation
page read and write
BE1000
trusted library allocation
page read and write
4DA000
unkown
page execute and read and write
19D3000
heap
page read and write
BF4000
trusted library allocation
page read and write
B53000
unkown
page execute and write copy
5739000
trusted library allocation
page read and write
AE7000
trusted library allocation
page read and write
34FE000
stack
page read and write
1774000
heap
page read and write
5060000
direct allocation
page read and write
573A000
trusted library allocation
page read and write
52E3000
trusted library allocation
page read and write
2F70000
direct allocation
page read and write
714000
unkown
page execute and read and write
573C000
trusted library allocation
page read and write
4C9F000
stack
page read and write
AE6000
trusted library allocation
page read and write
775D000
stack
page read and write
41AE000
stack
page read and write
BD6000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
4311000
heap
page read and write
34EF000
stack
page read and write
6D7000
unkown
page execute and read and write
714000
heap
page read and write
52DD000
trusted library allocation
page read and write
573F000
trusted library allocation
page read and write
52E3000
trusted library allocation
page read and write
4311000
heap
page read and write
820000
heap
page read and write
19FD000
heap
page read and write
573A000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
529A000
trusted library allocation
page read and write
39BF000
stack
page read and write
52BF000
trusted library allocation
page read and write
53DA000
trusted library allocation
page read and write
420E000
stack
page read and write
147E000
heap
page read and write
5071000
heap
page read and write
6E7000
unkown
page execute and read and write
89B000
unkown
page execute and read and write
4D0000
unkown
page read and write
47A0000
direct allocation
page read and write
573F000
trusted library allocation
page read and write
4DDF000
stack
page read and write
1774000
heap
page read and write
AE2000
trusted library allocation
page read and write
3DDE000
stack
page read and write
5071000
heap
page read and write
5690000
direct allocation
page execute and read and write
2FBF000
stack
page read and write
53B1000
trusted library allocation
page read and write
5071000
heap
page read and write
5060000
direct allocation
page read and write
5080000
direct allocation
page read and write
5091000
heap
page read and write
AE5000
trusted library allocation
page read and write
5071000
heap
page read and write
52CB000
trusted library allocation
page read and write
4311000
heap
page read and write
5071000
heap
page read and write
5071000
heap
page read and write
52BF000
trusted library allocation
page read and write
5060000
direct allocation
page read and write
5071000
heap
page read and write
830000
unkown
page readonly
A02000
heap
page read and write
B96000
trusted library allocation
page read and write
52CF000
trusted library allocation
page read and write
49B0000
direct allocation
page execute and read and write
52C2000
trusted library allocation
page read and write
BBC000
trusted library allocation
page read and write
AE1000
trusted library allocation
page read and write
C2B000
trusted library allocation
page read and write
573B000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
387F000
stack
page read and write
55C9000
trusted library allocation
page read and write
9FE000
heap
page read and write
714000
heap
page read and write
389F000
stack
page read and write
4311000
heap
page read and write
AE5000
trusted library allocation
page read and write
E3F000
stack
page read and write
4C34000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
AE2000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
810000
heap
page read and write
52B6000
trusted library allocation
page read and write
AEE000
trusted library allocation
page read and write
529A000
trusted library allocation
page read and write
52BF000
trusted library allocation
page read and write
52BA000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
1242000
unkown
page execute and read and write
28E7000
heap
page read and write
5071000
heap
page read and write
3B6E000
stack
page read and write
52BD000
trusted library allocation
page read and write
424000
heap
page read and write
3B3E000
stack
page read and write
4C1E000
trusted library allocation
page read and write
52EC000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
5737000
trusted library allocation
page read and write
4B90000
direct allocation
page execute and read and write
BBA000
trusted library allocation
page read and write
9E0000
heap
page read and write
EC000
stack
page read and write
BE6000
trusted library allocation
page read and write
43C1000
heap
page read and write
65F000
unkown
page execute and read and write
5D0000
heap
page read and write
1774000
heap
page read and write
53C4000
trusted library allocation
page read and write
52EA000
trusted library allocation
page read and write
34BF000
stack
page read and write
AEC000
trusted library allocation
page read and write
5091000
heap
page read and write
714000
heap
page read and write
53B9000
trusted library allocation
page read and write
5680000
direct allocation
page execute and read and write
5309000
trusted library allocation
page read and write
50A0000
heap
page read and write
B52000
unkown
page execute and read and write
BCA000
trusted library allocation
page read and write
9F4000
heap
page read and write
52CC000
trusted library allocation
page read and write
1242000
unkown
page execute and write copy
52CD000
trusted library allocation
page read and write
1774000
heap
page read and write
4BCF000
stack
page read and write
AEE000
trusted library allocation
page read and write
AEA000
trusted library allocation
page read and write
AE6000
trusted library allocation
page read and write
4D0F000
stack
page read and write
191C000
stack
page read and write
AE8000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
45CE000
stack
page read and write
5301000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
42EE000
stack
page read and write
479F000
stack
page read and write
53D2000
trusted library allocation
page read and write
429F000
stack
page read and write
302E000
stack
page read and write
424000
heap
page read and write
5091000
heap
page read and write
9F4000
heap
page read and write
52E9000
trusted library allocation
page read and write
714000
heap
page read and write
4311000
heap
page read and write
285F000
stack
page read and write
53A8000
trusted library allocation
page read and write
9F4000
heap
page read and write
5071000
heap
page read and write
4DA000
unkown
page execute and write copy
4ACE000
stack
page read and write
52A6000
trusted library allocation
page read and write
AE9000
trusted library allocation
page read and write
4920000
direct allocation
page execute and read and write
5071000
heap
page read and write
52BF000
trusted library allocation
page read and write
1774000
heap
page read and write
52DB000
trusted library allocation
page read and write
4F1F000
stack
page read and write
5739000
trusted library allocation
page read and write
5080000
direct allocation
page read and write
1774000
heap
page read and write
6F50000
heap
page read and write
AE0000
trusted library allocation
page read and write
5071000
heap
page read and write
354F000
stack
page read and write
1774000
heap
page read and write
430F000
stack
page read and write
E70000
direct allocation
page read and write
4B40000
direct allocation
page execute and read and write
52F1000
trusted library allocation
page read and write
5297000
trusted library allocation
page read and write
52D6000
trusted library allocation
page read and write
1CD000
unkown
page execute and write copy
4311000
heap
page read and write
171000
unkown
page execute and write copy
5741000
trusted library allocation
page read and write
1232000
unkown
page execute and read and write
4E6000
unkown
page execute and write copy
505F000
stack
page read and write
53B1000
trusted library allocation
page read and write
529A000
trusted library allocation
page read and write
BDD000
trusted library allocation
page read and write
BAF000
trusted library allocation
page read and write
5500000
direct allocation
page read and write
5392000
trusted library allocation
page read and write
58B8000
trusted library allocation
page read and write
1488000
heap
page read and write
56D0000
direct allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
4B60000
direct allocation
page execute and read and write
52FF000
trusted library allocation
page read and write
2D6F000
stack
page read and write
49E0000
direct allocation
page execute and read and write
B52000
unkown
page execute and write copy
765000
unkown
page execute and write copy
42DE000
stack
page read and write
52AF000
trusted library allocation
page read and write
52C2000
trusted library allocation
page read and write
64B000
unkown
page execute and write copy
5071000
heap
page read and write
AEC000
trusted library allocation
page read and write
6F50000
heap
page read and write
5398000
trusted library allocation
page read and write
56C0000
direct allocation
page execute and read and write
AE4000
trusted library allocation
page read and write
5914000
heap
page read and write
1770000
heap
page read and write
5910000
heap
page read and write
333E000
stack
page read and write
12F6000
heap
page read and write
BB1000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
AE6000
trusted library allocation
page read and write
6BB000
unkown
page execute and write copy
AE7000
trusted library allocation
page read and write
5080000
direct allocation
page read and write
19C0000
heap
page read and write
1774000
heap
page read and write
4B50000
direct allocation
page execute and read and write
46B000
unkown
page execute and write copy
B83000
trusted library allocation
page read and write
AE6000
trusted library allocation
page read and write
573F000
trusted library allocation
page read and write
A02000
heap
page read and write
E60000
heap
page read and write
52E2000
trusted library allocation
page read and write
5071000
heap
page read and write
5071000
heap
page read and write
AEC000
trusted library allocation
page read and write
5349000
trusted library allocation
page read and write
470E000
stack
page read and write
714000
heap
page read and write
3DBE000
stack
page read and write
E70000
direct allocation
page read and write
AE4000
trusted library allocation
page read and write
3F8E000
stack
page read and write
B90000
trusted library allocation
page read and write
1774000
heap
page read and write
87E3000
heap
page read and write
415F000
stack
page read and write
52AF000
trusted library allocation
page read and write
52B7000
trusted library allocation
page read and write
529D000
trusted library allocation
page read and write
49FE000
stack
page read and write
403E000
stack
page read and write
5071000
heap
page read and write
5091000
heap
page read and write
6F5000
unkown
page execute and write copy
357000
unkown
page execute and write copy
5071000
heap
page read and write
573B000
trusted library allocation
page read and write
4C1C000
trusted library allocation
page read and write
9F4000
heap
page read and write
52D5000
trusted library allocation
page read and write
9E5000
heap
page read and write
AE7000
trusted library allocation
page read and write
47A0000
direct allocation
page read and write
A0D000
heap
page read and write
5071000
heap
page read and write
AEF000
trusted library allocation
page read and write
6A26000
heap
page read and write
F89000
unkown
page write copy
52C2000
trusted library allocation
page read and write
52BF000
trusted library allocation
page read and write
AE7000
trusted library allocation
page read and write
5071000
heap
page read and write
B89000
trusted library allocation
page read and write
6F41000
heap
page read and write
5071000
heap
page read and write
5071000
heap
page read and write
5230000
direct allocation
page execute and read and write
AEE000
trusted library allocation
page read and write
53A9000
trusted library allocation
page read and write
BB2000
trusted library allocation
page read and write
52C2000
trusted library allocation
page read and write
1A0D000
heap
page read and write
52EB000
trusted library allocation
page read and write
4A8F000
stack
page read and write
5060000
direct allocation
page read and write
394E000
stack
page read and write
5071000
heap
page read and write
5CE000
heap
page read and write
19E1000
heap
page read and write
5071000
heap
page read and write
1774000
heap
page read and write
1480000
heap
page read and write
427F000
stack
page read and write
380E000
stack
page read and write
1B1E000
stack
page read and write
75E000
unkown
page execute and write copy
4311000
heap
page read and write
6E2000
unkown
page execute and read and write
B7B000
trusted library allocation
page read and write
52CB000
trusted library allocation
page read and write
BF6000
trusted library allocation
page read and write
524B000
trusted library allocation
page execute and read and write
A06000
heap
page read and write
52F0000
trusted library allocation
page read and write
19D6000
heap
page read and write
B52000
unkown
page execute and read and write
52AF000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
3FFF000
stack
page read and write
9EC000
heap
page read and write
51B0000
trusted library allocation
page read and write
5639000
trusted library allocation
page read and write
53B9000
trusted library allocation
page read and write
55B1000
trusted library allocation
page read and write
25F0000
heap
page read and write
C0B000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
4530000
heap
page read and write
52D9000
trusted library allocation
page read and write
B53000
unkown
page execute and write copy
5071000
heap
page read and write
2F5B000
stack
page read and write
BC3000
trusted library allocation
page read and write
563F000
stack
page read and write
6D4000
unkown
page execute and write copy
2B2E000
stack
page read and write
5090000
heap
page read and write
18DE000
stack
page read and write
4990000
direct allocation
page execute and read and write
5080000
direct allocation
page read and write
99C000
heap
page read and write
AE9000
trusted library allocation
page read and write
BF4000
trusted library allocation
page read and write
4B70000
direct allocation
page execute and read and write
5071000
heap
page read and write
776000
unkown
page execute and write copy
19DA000
heap
page read and write
5071000
heap
page read and write
BEE000
trusted library allocation
page read and write
573C000
trusted library allocation
page read and write
AE7000
trusted library allocation
page read and write
5091000
heap
page read and write
5071000
heap
page read and write
49C0000
direct allocation
page read and write
5A9F000
trusted library allocation
page read and write
65C000
unkown
page execute and write copy
52DB000
trusted library allocation
page read and write
5737000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
4300000
direct allocation
page read and write
5071000
heap
page read and write
CF4000
unkown
page execute and read and write
710000
heap
page read and write
573F000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
5060000
direct allocation
page read and write
192A000
heap
page read and write
AE7000
trusted library allocation
page read and write
63A000
unkown
page execute and write copy
9AB000
heap
page read and write
323F000
stack
page read and write
46CE000
stack
page read and write
AE7000
trusted library allocation
page read and write
49C0000
direct allocation
page execute and read and write
A02000
heap
page read and write
52F1000
trusted library allocation
page read and write
37CF000
stack
page read and write
AE2000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
4D2000
unkown
page execute and write copy
5071000
heap
page read and write
2C6E000
stack
page read and write
999000
heap
page read and write
5071000
heap
page read and write
5071000
heap
page read and write
51C4000
trusted library allocation
page read and write
5592000
trusted library allocation
page read and write
820000
direct allocation
page read and write
53B1000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
BDF000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
1440000
heap
page read and write
C4C000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
8CCB000
stack
page read and write
337F000
stack
page read and write
4970000
trusted library allocation
page read and write
5700000
direct allocation
page execute and read and write
BE4000
trusted library allocation
page read and write
3C5F000
stack
page read and write
53B1000
trusted library allocation
page read and write
831000
unkown
page execute and write copy
419E000
stack
page read and write
54CC000
stack
page read and write
1774000
heap
page read and write
53A0000
trusted library allocation
page read and write
5736000
trusted library allocation
page read and write
B81000
trusted library allocation
page read and write
1774000
heap
page read and write
BF2000
trusted library allocation
page read and write
52CC000
trusted library allocation
page read and write
170000
unkown
page readonly
53C8000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
5071000
heap
page read and write
52FE000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
AE5000
trusted library allocation
page read and write
AE1000
trusted library allocation
page read and write
5731000
trusted library allocation
page read and write
69B000
unkown
page execute and read and write
638000
unkown
page execute and read and write
B93000
trusted library allocation
page read and write
3F2E000
stack
page read and write
52CB000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
3EDF000
stack
page read and write
A06000
heap
page read and write
B0C000
unkown
page execute and read and write
5311000
trusted library allocation
page read and write
5071000
heap
page read and write
1270000
heap
page read and write
9FA000
heap
page read and write
4300000
direct allocation
page read and write
52CB000
trusted library allocation
page read and write
5071000
heap
page read and write
5071000
heap
page read and write
78D0000
heap
page execute and read and write
187F000
stack
page read and write
52D9000
trusted library allocation
page read and write
4531000
heap
page read and write
820000
direct allocation
page read and write
AEC000
trusted library allocation
page read and write
172E000
stack
page read and write
416F000
stack
page read and write
9FA000
heap
page read and write
173E000
stack
page read and write
5071000
heap
page read and write
14D3000
heap
page read and write
30FF000
stack
page read and write
AEA000
trusted library allocation
page read and write
5299000
trusted library allocation
page read and write
37AE000
stack
page read and write
B88000
trusted library allocation
page read and write
424000
heap
page read and write
1774000
heap
page read and write
891B000
stack
page read and write
5230000
trusted library allocation
page read and write
AEA000
trusted library allocation
page read and write
BF8000
trusted library allocation
page read and write
6F40000
heap
page read and write
2F87000
heap
page read and write
6A10000
heap
page read and write
4B40000
direct allocation
page execute and read and write
460000
heap
page read and write
53A0000
trusted library allocation
page read and write
4531000
heap
page read and write
79DE000
stack
page read and write
AE8000
trusted library allocation
page read and write
4311000
heap
page read and write
8A1C000
stack
page read and write
9BF000
heap
page read and write
5071000
heap
page read and write
3A4F000
stack
page read and write
1974000
heap
page read and write
830000
unkown
page read and write
AEB000
trusted library allocation
page read and write
5680000
direct allocation
page execute and read and write
5247000
trusted library allocation
page execute and read and write
5733000
trusted library allocation
page read and write
AE3000
trusted library allocation
page read and write
AE5000
trusted library allocation
page read and write
5598000
trusted library allocation
page read and write
529D000
trusted library allocation
page read and write
B94000
trusted library allocation
page read and write
1774000
heap
page read and write
5071000
heap
page read and write
EFC000
stack
page read and write
5349000
trusted library allocation
page read and write
52BF000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
5091000
heap
page read and write
AE0000
trusted library allocation
page read and write
5739000
trusted library allocation
page read and write
441E000
stack
page read and write
A09000
heap
page read and write
52E8000
trusted library allocation
page read and write
9F6000
heap
page read and write
5091000
heap
page read and write
5071000
heap
page read and write
1774000
heap
page read and write
5071000
heap
page read and write
5315000
trusted library allocation
page read and write
B42000
unkown
page execute and read and write
BBC000
trusted library allocation
page read and write
4300000
direct allocation
page read and write
AE3000
trusted library allocation
page read and write
5738000
trusted library allocation
page read and write
52B5000
trusted library allocation
page read and write
4311000
heap
page read and write
672000
unkown
page execute and write copy
4E1E000
stack
page read and write
36CE000
stack
page read and write
529A000
trusted library allocation
page read and write
52CC000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
3C7E000
stack
page read and write
E80000
heap
page read and write
5071000
heap
page read and write
AEB000
trusted library allocation
page read and write
9E5000
heap
page read and write
401F000
stack
page read and write
AE6000
trusted library allocation
page read and write
176E000
stack
page read and write
273E000
stack
page read and write
529D000
trusted library allocation
page read and write
52FA000
trusted library allocation
page read and write
5071000
heap
page read and write
52CB000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
820000
direct allocation
page read and write
5091000
heap
page read and write
39EF000
stack
page read and write
A04000
heap
page read and write
5071000
heap
page read and write
52AE000
stack
page read and write
529B000
trusted library allocation
page read and write
52BD000
trusted library allocation
page read and write
56F0000
direct allocation
page execute and read and write
64A000
unkown
page execute and read and write
5661000
trusted library allocation
page read and write
359F000
stack
page read and write
4311000
heap
page read and write
714000
heap
page read and write
B8E000
trusted library allocation
page read and write
192E000
heap
page read and write
3D0E000
stack
page read and write
5081000
heap
page read and write
5669000
trusted library allocation
page read and write
111A000
unkown
page execute and read and write
BF0000
trusted library allocation
page read and write
5071000
heap
page read and write
B8F000
trusted library allocation
page read and write
99C000
heap
page read and write
1774000
heap
page read and write
4910000
direct allocation
page execute and read and write
BEC000
trusted library allocation
page read and write
51D4000
trusted library allocation
page read and write
B7D000
trusted library allocation
page read and write
39FD000
stack
page read and write
3A1E000
stack
page read and write
6A4000
unkown
page execute and write copy
BA7000
trusted library allocation
page read and write
5391000
trusted library allocation
page read and write
AED000
trusted library allocation
page read and write
52CD000
trusted library allocation
page read and write
4E4000
unkown
page execute and write copy
41CF000
stack
page read and write
521C000
stack
page read and write
52D5000
trusted library allocation
page read and write
52D2000
trusted library allocation
page read and write
4300000
direct allocation
page read and write
53A0000
trusted library allocation
page read and write
5298000
trusted library allocation
page read and write
AE6000
trusted library allocation
page read and write
A02000
heap
page read and write
52A3000
trusted library allocation
page read and write
6BF000
unkown
page execute and read and write
19A6000
heap
page read and write
3F1E000
stack
page read and write
529A000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
5680000
direct allocation
page execute and read and write
4311000
heap
page read and write
1774000
heap
page read and write
31CE000
stack
page read and write
B8F000
trusted library allocation
page read and write
52E4000
trusted library allocation
page read and write
5240000
trusted library allocation
page read and write
4920000
direct allocation
page execute and read and write
AEF000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
28DE000
stack
page read and write
820000
direct allocation
page read and write
46C000
stack
page read and write
820000
direct allocation
page read and write
5071000
heap
page read and write
35FF000
stack
page read and write
5348000
trusted library allocation
page read and write
5080000
direct allocation
page read and write
52F7000
trusted library allocation
page read and write
5060000
direct allocation
page read and write
4300000
direct allocation
page read and write
49A0000
direct allocation
page execute and read and write
498E000
stack
page read and write
1774000
heap
page read and write
33AF000
stack
page read and write
820000
direct allocation
page read and write
5060000
direct allocation
page read and write
3B2F000
stack
page read and write
9EC000
heap
page read and write
5349000
trusted library allocation
page read and write
52C0000
heap
page read and write
6C2F000
stack
page read and write
52BF000
trusted library allocation
page read and write
19C0000
heap
page read and write
B3B000
unkown
page execute and read and write
379F000
stack
page read and write
3AFE000
stack
page read and write
3CAE000
stack
page read and write
5650000
direct allocation
page execute and read and write
497F000
stack
page read and write
9DC000
heap
page read and write
52F1000
trusted library allocation
page read and write
52CB000
trusted library allocation
page read and write
52DF000
trusted library allocation
page read and write
1969000
heap
page read and write
362F000
stack
page read and write
308F000
stack
page read and write
3397000
heap
page read and write
5391000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
AE4000
trusted library allocation
page read and write
5071000
heap
page read and write
452F000
stack
page read and write
52EC000
trusted library allocation
page read and write
52D2000
trusted library allocation
page read and write
32CF000
stack
page read and write
5680000
direct allocation
page execute and read and write
52CB000
trusted library allocation
page read and write
4300000
direct allocation
page read and write
5071000
heap
page read and write
5741000
trusted library allocation
page read and write
A04000
heap
page read and write
349F000
stack
page read and write
8DE5000
heap
page read and write
5071000
heap
page read and write
AE4000
trusted library allocation
page read and write
AEA000
trusted library allocation
page read and write
38AF000
stack
page read and write
51C3000
trusted library allocation
page execute and read and write
455E000
stack
page read and write
52B0000
trusted library allocation
page read and write
50B0000
heap
page read and write
3B1F000
stack
page read and write
4B40000
direct allocation
page execute and read and write
4311000
heap
page read and write
5071000
heap
page read and write
5080000
direct allocation
page read and write
52FE000
trusted library allocation
page read and write
1774000
heap
page read and write
313E000
stack
page read and write
52FA000
trusted library allocation
page read and write
344E000
stack
page read and write
5391000
trusted library allocation
page read and write
5091000
heap
page read and write
5349000
trusted library allocation
page read and write
657000
unkown
page execute and read and write
991000
heap
page read and write
3BCE000
stack
page read and write
49C0000
direct allocation
page execute and read and write
5349000
trusted library allocation
page read and write
52A6000
trusted library allocation
page read and write
820000
direct allocation
page read and write
52D9000
trusted library allocation
page read and write
1774000
heap
page read and write
AE3000
trusted library allocation
page read and write
5091000
heap
page read and write
1774000
heap
page read and write
4300000
direct allocation
page read and write
19DE000
heap
page read and write
B3B000
unkown
page execute and read and write
714000
heap
page read and write
4AFF000
stack
page read and write
4D2000
unkown
page execute and read and write
1999000
heap
page read and write
4920000
direct allocation
page execute and read and write
330E000
stack
page read and write
F10000
heap
page read and write
E70000
direct allocation
page read and write
5060000
direct allocation
page read and write
52C2000
trusted library allocation
page read and write
820000
direct allocation
page read and write
2EAF000
stack
page read and write
A03000
heap
page read and write
B0C000
unkown
page execute and read and write
5393000
trusted library allocation
page read and write
3B5E000
stack
page read and write
657000
unkown
page execute and write copy
820000
direct allocation
page read and write
820000
direct allocation
page read and write
51E0000
direct allocation
page read and write
52C2000
trusted library allocation
page read and write
52AF000
trusted library allocation
page read and write
87E0000
heap
page read and write
4B2D000
trusted library allocation
page read and write
52FA000
trusted library allocation
page read and write
5060000
direct allocation
page read and write
13F0000
heap
page read and write
4300000
direct allocation
page read and write
529B000
trusted library allocation
page read and write
5060000
direct allocation
page read and write
494F000
stack
page read and write
6F4E000
heap
page read and write
573A000
trusted library allocation
page read and write
52B5000
trusted library allocation
page read and write
52E2000
trusted library allocation
page read and write
AE2000
trusted library allocation
page read and write
19EE000
heap
page read and write
712000
unkown
page execute and write copy
AEF000
trusted library allocation
page read and write
BF4000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
52E8000
trusted library allocation
page read and write
5091000
heap
page read and write
C05000
trusted library allocation
page read and write
530A000
trusted library allocation
page read and write
4BB0000
direct allocation
page execute and read and write
3C9E000
stack
page read and write
5739000
trusted library allocation
page read and write
47DE000
stack
page read and write
9F5000
heap
page read and write
AEA000
trusted library allocation
page read and write
413F000
stack
page read and write
4B80000
direct allocation
page execute and read and write
B9D000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
AE5000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
899000
unkown
page write copy
C4E000
trusted library allocation
page read and write
1774000
heap
page read and write
4300000
direct allocation
page read and write
540000
heap
page read and write
C4D000
trusted library allocation
page read and write
1774000
heap
page read and write
4311000
heap
page read and write
52FF000
trusted library allocation
page read and write
C3A000
trusted library allocation
page read and write
EAA000
stack
page read and write
AEC000
trusted library allocation
page read and write
AE7000
trusted library allocation
page read and write
52D2000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
C31000
trusted library allocation
page read and write
9D9000
heap
page read and write
408F000
stack
page read and write
98C000
heap
page read and write
AE9000
trusted library allocation
page read and write
5071000
heap
page read and write
5348000
trusted library allocation
page read and write
64E000
unkown
page execute and read and write
4B20000
direct allocation
page execute and read and write
BC1000
trusted library allocation
page read and write
390F000
stack
page read and write
714000
heap
page read and write
1243000
unkown
page execute and write copy
5349000
trusted library allocation
page read and write
491E000
stack
page read and write
5397000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
BC9000
trusted library allocation
page read and write
52BF000
trusted library allocation
page read and write
5741000
trusted library allocation
page read and write
5071000
heap
page read and write
B71000
trusted library allocation
page read and write
AE9000
trusted library allocation
page read and write
5349000
trusted library allocation
page read and write
25DE000
stack
page read and write
B9B000
trusted library allocation
page read and write
9EC000
heap
page read and write
52EA000
trusted library allocation
page read and write
5349000
trusted library allocation
page read and write
5071000
heap
page read and write
785E000
stack
page read and write
C3C000
trusted library allocation
page read and write
AEA000
trusted library allocation
page read and write
4A21000
direct allocation
page read and write
4CDE000
stack
page read and write
F8B000
unkown
page execute and read and write
E70000
direct allocation
page read and write
424000
heap
page read and write
AE5000
trusted library allocation
page read and write
CF4000
unkown
page execute and read and write
AEE000
trusted library allocation
page read and write
4B9E000
stack
page read and write
4D6000
unkown
page write copy
5091000
heap
page read and write
47A0000
direct allocation
page read and write
2EEE000
stack
page read and write
AE9000
trusted library allocation
page read and write
1774000
heap
page read and write
5071000
heap
page read and write
59D4000
trusted library allocation
page read and write
40CE000
stack
page read and write
52EB000
trusted library allocation
page read and write
4B40000
direct allocation
page execute and read and write
1774000
heap
page read and write
B84000
trusted library allocation
page read and write
5738000
trusted library allocation
page read and write
417E000
stack
page read and write
BB4000
trusted library allocation
page read and write
5071000
heap
page read and write
434E000
stack
page read and write
6F9000
unkown
page execute and write copy
6F8000
unkown
page execute and read and write
B70000
trusted library allocation
page read and write
446000
unkown
page execute and write copy
424000
heap
page read and write
820000
direct allocation
page read and write
53C7000
trusted library allocation
page read and write
4E5000
unkown
page execute and read and write
56E0000
direct allocation
page execute and read and write
19EE000
heap
page read and write
406E000
stack
page read and write
F21000
unkown
page execute and write copy
6A20000
heap
page read and write
5071000
heap
page read and write
9E4000
heap
page read and write
2BFF000
stack
page read and write
448E000
stack
page read and write
1774000
heap
page read and write
25F7000
heap
page read and write
4A40000
direct allocation
page execute and read and write
3B8F000
stack
page read and write
4978000
trusted library allocation
page read and write
53DD000
trusted library allocation
page read and write
1920000
heap
page read and write
318F000
stack
page read and write
4E00000
remote allocation
page read and write
5AE000
stack
page read and write
AEC000
trusted library allocation
page read and write
5071000
heap
page read and write
5303000
trusted library allocation
page read and write
A02000
heap
page read and write
52B0000
trusted library allocation
page read and write
6AA000
unkown
page execute and read and write
424000
heap
page read and write
52CF000
trusted library allocation
page read and write
48A1000
direct allocation
page read and write
714000
heap
page read and write
B52000
unkown
page execute and write copy
899000
unkown
page write copy
9AB000
heap
page read and write
6A7000
unkown
page execute and write copy
52FE000
trusted library allocation
page read and write
163F000
stack
page read and write
6C7000
unkown
page execute and write copy
487E000
stack
page read and write
53CF000
stack
page read and write
5080000
direct allocation
page read and write
899000
unkown
page write copy
442E000
stack
page read and write
774000
unkown
page execute and write copy
5091000
heap
page read and write
6EF000
unkown
page execute and write copy
6A5000
unkown
page execute and read and write
49F0000
direct allocation
page execute and read and write
368F000
stack
page read and write
4C41000
trusted library allocation
page read and write
52CD000
trusted library allocation
page read and write
573C000
trusted library allocation
page read and write
5091000
heap
page read and write
5071000
heap
page read and write
B42000
unkown
page execute and read and write
1774000
heap
page read and write
2FFE000
stack
page read and write
8DCC000
stack
page read and write
52F9000
trusted library allocation
page read and write
5071000
heap
page read and write
377E000
stack
page read and write
19E8000
heap
page read and write
52D2000
trusted library allocation
page read and write
1774000
heap
page read and write
5071000
heap
page read and write
52B1000
trusted library allocation
page read and write
5071000
heap
page read and write
5CA000
heap
page read and write
19E1000
heap
page read and write
1774000
heap
page read and write
49C0000
direct allocation
page read and write
A02000
heap
page read and write
E70000
direct allocation
page read and write
4A30000
direct allocation
page execute and read and write
532A000
trusted library allocation
page read and write
AE5000
trusted library allocation
page read and write
81F000
stack
page read and write
5071000
heap
page read and write
735000
unkown
page execute and write copy
BF2000
trusted library allocation
page read and write
12DE000
stack
page read and write
DAB000
stack
page read and write
F82000
unkown
page execute and read and write
424000
heap
page read and write
26FF000
stack
page read and write
5070000
heap
page read and write
5091000
heap
page read and write
A02000
heap
page read and write
144A000
heap
page read and write
149D000
heap
page read and write
9FA000
heap
page read and write
5071000
heap
page read and write
4E00000
remote allocation
page read and write
53A9000
trusted library allocation
page read and write
5071000
heap
page read and write
BAD000
trusted library allocation
page read and write
49C0000
direct allocation
page execute and read and write
B9C000
trusted library allocation
page read and write
714000
heap
page read and write
A0A000
heap
page read and write
19DB000
heap
page read and write
363E000
stack
page read and write
CF6000
unkown
page execute and write copy
AE4000
trusted library allocation
page read and write
19E8000
heap
page read and write
9EC000
heap
page read and write
49C0000
direct allocation
page execute and read and write
373F000
stack
page read and write
1774000
heap
page read and write
2D7E000
stack
page read and write
9FE000
heap
page read and write
531A000
trusted library allocation
page read and write
420000
heap
page read and write
AE3000
trusted library allocation
page read and write
458F000
stack
page read and write
BAF000
trusted library allocation
page read and write
52DC000
trusted library allocation
page read and write
6A25000
heap
page read and write
19D4000
heap
page read and write
5080000
direct allocation
page read and write
5739000
trusted library allocation
page read and write
19D3000
heap
page read and write
5734000
trusted library allocation
page read and write
789E000
stack
page read and write
49C0000
direct allocation
page execute and read and write
5071000
heap
page read and write
714000
heap
page read and write
2C2F000
stack
page read and write
52E1000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
358E000
stack
page read and write
B81000
trusted library allocation
page read and write
5071000
heap
page read and write
573D000
trusted library allocation
page read and write
714000
heap
page read and write
5303000
trusted library allocation
page read and write
AED000
trusted library allocation
page read and write
5550000
heap
page execute and read and write
AED000
trusted library allocation
page read and write
4B30000
direct allocation
page execute and read and write
52EC000
trusted library allocation
page read and write
673000
unkown
page execute and read and write
AEC000
trusted library allocation
page read and write
45E000
unkown
page execute and write copy
12F0000
heap
page read and write
3DEE000
stack
page read and write
820000
direct allocation
page read and write
19E6000
heap
page read and write
52A3000
trusted library allocation
page read and write
5071000
heap
page read and write
892000
unkown
page execute and read and write
13E6000
unkown
page execute and write copy
424000
heap
page read and write
9D4000
heap
page read and write
5391000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
B71000
trusted library allocation
page read and write
43C1000
heap
page read and write
1774000
heap
page read and write
F20000
unkown
page readonly
4D0000
unkown
page readonly
714000
heap
page read and write
D3E000
stack
page read and write
52CB000
trusted library allocation
page read and write
5071000
heap
page read and write
AE4000
trusted library allocation
page read and write
52CB000
trusted library allocation
page read and write
C03000
trusted library allocation
page read and write
1774000
heap
page read and write
5071000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
9E4000
heap
page read and write
529E000
trusted library allocation
page read and write
1774000
heap
page read and write
820000
direct allocation
page read and write
1774000
heap
page read and write
424000
heap
page read and write
89B000
unkown
page execute and read and write
69BE000
stack
page read and write
6DF000
unkown
page execute and write copy
AE9000
trusted library allocation
page read and write
1430000
heap
page read and write
A02000
heap
page read and write
4900000
direct allocation
page execute and read and write
2AEF000
stack
page read and write
3E0F000
stack
page read and write
9EC000
heap
page read and write
4311000
heap
page read and write
32AE000
stack
page read and write
530A000
trusted library allocation
page read and write
33EE000
stack
page read and write
AE3000
trusted library allocation
page read and write
714000
heap
page read and write
1774000
heap
page read and write
5736000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
53B1000
trusted library allocation
page read and write
5391000
trusted library allocation
page read and write
BB2000
trusted library allocation
page read and write
287E000
stack
page read and write
1CB000
unkown
page execute and write copy
AF1000
trusted library allocation
page read and write
AE2000
trusted library allocation
page read and write
337E000
stack
page read and write
49D0000
direct allocation
page execute and read and write
4C0E000
stack
page read and write
5680000
direct allocation
page execute and read and write
53A0000
trusted library allocation
page read and write
52AD000
trusted library allocation
page read and write
529A000
trusted library allocation
page read and write
198C000
heap
page read and write
5071000
heap
page read and write
E8B000
heap
page read and write
52BF000
trusted library allocation
page read and write
4D6000
unkown
page write copy
2AFE000
stack
page read and write
5710000
direct allocation
page execute and read and write
4300000
direct allocation
page read and write
444F000
stack
page read and write
7FE000
stack
page read and write
AE3000
trusted library allocation
page read and write
2DAE000
stack
page read and write
3EEF000
stack
page read and write
1A00000
heap
page read and write
1492000
heap
page read and write
9EC000
heap
page read and write
19E1000
heap
page read and write
424000
heap
page read and write
F89000
unkown
page write copy
52CD000
trusted library allocation
page read and write
297F000
stack
page read and write
53D9000
trusted library allocation
page read and write
52CB000
trusted library allocation
page read and write
5071000
heap
page read and write
3DAF000
stack
page read and write
1774000
heap
page read and write
4920000
direct allocation
page execute and read and write
4311000
heap
page read and write
AE7000
trusted library allocation
page read and write
5071000
heap
page read and write
BEA000
trusted library allocation
page read and write
5060000
direct allocation
page read and write
E70000
direct allocation
page read and write
AE5000
trusted library allocation
page read and write
2FEF000
stack
page read and write
AE7000
trusted library allocation
page read and write
52BB000
trusted library allocation
page read and write
29BE000
stack
page read and write
480F000
stack
page read and write
B9A000
trusted library allocation
page read and write
5060000
direct allocation
page read and write
BCC000
trusted library allocation
page read and write
424000
heap
page read and write
5071000
heap
page read and write
5313000
trusted library allocation
page read and write
830000
unkown
page readonly
9F8000
heap
page read and write
765000
unkown
page execute and write copy
1ED000
stack
page read and write
831000
unkown
page execute and write copy
5060000
direct allocation
page read and write
550E000
stack
page read and write
52B0000
trusted library allocation
page execute and read and write
892000
unkown
page execute and read and write
9F5000
heap
page read and write
448000
unkown
page execute and write copy
6E2F000
stack
page read and write
51E0000
direct allocation
page read and write
3380000
heap
page read and write
BD8000
trusted library allocation
page read and write
48DF000
stack
page read and write
289E000
stack
page read and write
9E5000
heap
page read and write
366E000
stack
page read and write
5080000
direct allocation
page read and write
5071000
heap
page read and write
71E000
unkown
page execute and read and write
8B5E000
stack
page read and write
52C2000
trusted library allocation
page read and write
4A5E000
stack
page read and write
6685000
trusted library allocation
page read and write
3D9F000
stack
page read and write
122B000
unkown
page execute and read and write
AE3000
trusted library allocation
page read and write
5091000
heap
page read and write
53A0000
trusted library allocation
page read and write
3F4F000
stack
page read and write
3A8E000
stack
page read and write
AEE000
trusted library allocation
page read and write
52B5000
trusted library allocation
page read and write
714000
heap
page read and write
565E000
stack
page read and write
424000
heap
page read and write
4311000
heap
page read and write
C2F000
trusted library allocation
page read and write
AF1000
trusted library allocation
page read and write
5737000
trusted library allocation
page read and write
340F000
stack
page read and write
554E000
stack
page read and write
B91000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
19C0000
heap
page read and write
43C0000
heap
page read and write
2E7F000
stack
page read and write
523A000
trusted library allocation
page execute and read and write
53D9000
trusted library allocation
page read and write
5391000
trusted library allocation
page read and write
52BF000
trusted library allocation
page read and write
52CB000
trusted library allocation
page read and write
774000
unkown
page execute and read and write
A2A000
unkown
page execute and read and write
5071000
heap
page read and write
2C3E000
stack
page read and write
144E000
heap
page read and write
52CD000
trusted library allocation
page read and write
1774000
heap
page read and write
5731000
trusted library allocation
page read and write
326F000
stack
page read and write
5071000
heap
page read and write
E70000
direct allocation
page read and write
19DB000
heap
page read and write
52AC000
trusted library allocation
page read and write
5650000
heap
page read and write
59C5000
trusted library allocation
page read and write
5080000
direct allocation
page read and write
19EE000
heap
page read and write
52CB000
trusted library allocation
page read and write
5071000
heap
page read and write
43C1000
heap
page read and write
5080000
direct allocation
page read and write
52CF000
trusted library allocation
page read and write
5299000
trusted library allocation
page read and write
32FE000
stack
page read and write
5470000
trusted library allocation
page read and write
69FE000
stack
page read and write
48F0000
direct allocation
page execute and read and write
BB0000
trusted library allocation
page read and write
1774000
heap
page read and write
703000
unkown
page execute and read and write
6661000
trusted library allocation
page read and write
5398000
trusted library allocation
page read and write
56D000
stack
page read and write
9F5000
heap
page read and write
C39000
trusted library allocation
page read and write
51E0000
direct allocation
page read and write
AE5000
trusted library allocation
page read and write
C1F000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
53A8000
trusted library allocation
page read and write
198B000
heap
page read and write
4840000
direct allocation
page read and write
4531000
heap
page read and write
1C9000
unkown
page write copy
1774000
heap
page read and write
1260000
heap
page read and write
5091000
heap
page read and write
369F000
stack
page read and write
52CF000
trusted library allocation
page read and write
5260000
direct allocation
page execute and read and write
52A5000
trusted library allocation
page read and write
5080000
direct allocation
page read and write
5735000
trusted library allocation
page read and write
BB9000
trusted library allocation
page read and write
5080000
direct allocation
page read and write
52F5000
trusted library allocation
page read and write
5661000
trusted library allocation
page read and write
3EBF000
stack
page read and write
AE7000
trusted library allocation
page read and write
530A000
trusted library allocation
page read and write
4A50000
direct allocation
page execute and read and write
5071000
heap
page read and write
AEC000
trusted library allocation
page read and write
70E000
stack
page read and write
5348000
trusted library allocation
page read and write
5071000
heap
page read and write
5071000
heap
page read and write
5071000
heap
page read and write
469E000
stack
page read and write
56A0000
direct allocation
page execute and read and write
52F3000
trusted library allocation
page read and write
776000
unkown
page execute and write copy
98E000
heap
page read and write
3CCF000
stack
page read and write
3C3F000
stack
page read and write
899000
unkown
page write copy
4BC0000
direct allocation
page execute and read and write
991000
heap
page read and write
5071000
heap
page read and write
4B5F000
stack
page read and write
4B40000
direct allocation
page execute and read and write
C4F000
trusted library allocation
page read and write
53BF000
trusted library allocation
page read and write
F20000
unkown
page read and write
8DD0000
heap
page read and write
53B9000
trusted library allocation
page read and write
11FC000
unkown
page execute and read and write
5FB9000
trusted library allocation
page read and write
3E4E000
stack
page read and write
B99000
trusted library allocation
page read and write
5071000
heap
page read and write
2ABF000
stack
page read and write
AEC000
trusted library allocation
page read and write
52AF000
trusted library allocation
page read and write
38EE000
stack
page read and write
2EBE000
stack
page read and write
9E3000
heap
page read and write
5680000
direct allocation
page execute and read and write
AE8000
trusted library allocation
page read and write
BBE000
trusted library allocation
page read and write
BDB000
trusted library allocation
page read and write
E70000
direct allocation
page read and write
52B7000
trusted library allocation
page read and write
42AF000
stack
page read and write
484E000
stack
page read and write
19FD000
heap
page read and write
1774000
heap
page read and write
5071000
heap
page read and write
52C2000
trusted library allocation
page read and write
529A000
trusted library allocation
page read and write
B7F000
trusted library allocation
page read and write
465F000
stack
page read and write
4920000
direct allocation
page execute and read and write
4C2C000
trusted library allocation
page read and write
5071000
heap
page read and write
697E000
stack
page read and write
327E000
stack
page read and write
BA5000
trusted library allocation
page read and write
4840000
direct allocation
page read and write
5071000
heap
page read and write
A2A000
unkown
page execute and read and write
197D000
heap
page read and write
5303000
trusted library allocation
page read and write
56B0000
direct allocation
page execute and read and write
There are 1431 hidden memdumps, click here to show them.